The Differences Between Computer Threats

Published on December 2016 | Categories: Documents | Downloads: 65 | Comments: 0 | Views: 750
of 4
Download PDF   Embed   Report

Comments

Content


The Differences Between Adware, Spyware
and Malware
Written by: Finn OrIano · Edited by: Brian Nelson
Updated Apr 13, 2009 · Related Guides: Malware , Spyware
Every internet user should know how to avoid and be aware oI the diIIerences between adware,
spyware and malware.
Malware
Malware is a very general word Ior soItware that deliberately harms, restricts, alters, or stops
your computer Irom working properly where the true purpose oI the download or installation is
hidden or diIIicult to Iind and not clearly explained to the user. The user does not give
permission Ior installation and use. Malware includes adware, spyware, tracking cookies and
inIectors (worms, viruses, Trojans, backdoors, toolkits). The basic rule Ior saIety is to use both
updated anti-spyware and anti-virus soItware.
Malware can arrive through an internet download, as an email link or attachment, as a Iile sent
between users oI instant messaging, social networking communities, peer-to-peer Iile sharing
programs, online games, online video games or chatrooms or a link to a malicious webpage.
Sometimes when someone downloads a "Iree" program Irom the internet, whether the program is
Ior access to a restricted website, to play a game, or to use a peer-to-peer Iile sharing program,
there can be compensation Ior the privilege oI downloading the Iree soItware. This compensation
can be:
VÌPRE Antivirus
www.VÌPREAntivirus.com
Official Website of VÌRPE Antivirus Download a free trial today!
Ads by Google
O n the Iorm oI a phone bill Irom a long distance internet access connection.
O Giving your permission by marking the box that says you already read the "Terms oI the
Agreement" or the "License Agreement" beIore downloading. These agreements can say
you are giving your permission to the company or website to track or monitor your online
activities or behavior Ior marketing or statistical purposes, or you can be giving your
permission Ior this company or website to use the resources oI your computer.
ndications of Malware
ndications that some kind oI malware is probably installed on your computer can be:
O The browser`s home page keeps changing
O !op-up advertisements appear when your browser is closed, pop-ups immediately begin
when you connect to the internet or the amount oI pop-up advertisements is way too
much.
O Strange icons appear on your desktop without your prompting or knowledge oI the
program
O The computer light is blinking (meaning that your computer is processing inIormation) at
unusual or unexpected times. This is diIIicult to observe with broadband since there is not
a visual diIIerence between incoming and outgoing data.
O our browser settings keep changing, including the webpage you designate as your
internet start-up page
O Files are uploaded or downloaded without your prompting or permission
Adware
Adware displays advertisements directed to your individual preIerences based on websites you
visited online, individual buying choices and the conIiguration oI your computer`s hardware and
soItware. This is not diIIerent than looking at an article oI clothing in a store and someone
continually puts a competitor`s item in your view. Adware can track your online activities,
collect your web surIing habits, email addresses, and purchase preIerences. t can also gather
inIormation about the hardware and soItware installed on your home computer and sends that
inIormation to marketers.
Many times the internet user does not understand or read the usually lengthy and conIusing
EULA (End-User License Agreement) beIore agreeing to the terms because they want to
immediately download the Iree game, screen saver, utility or advertisement supported soItware.
The internet user can use the download with no monetary charge in exchange Ior viewing
advertisements while online inside a webpage or as a pop-up window. Advertisers typically do
not consider adware as malware because the internet user agrees to the EULA beIore copying,
downloading, installing, registering or using the soItware. The computer user usually has an
option to buy a license to stop the advertisements Irom displaying. The computer user knows that
in exchange Ior not buying a license, they will see advertisements that the company hopes they
will click on and buy the product or service. Other adware License Agreements include
permissions Irom the user to the company Ior privileges stated in the agreement. The computer
user should always read and understand any agreement beIore accepting. I you do not read and
understand what you are agreeing to, you may be giving your permission to the company or third
party to monitor your activities while online.
This monitoring can include where you go, where you shop or your web browsing preIerences
and habits. Companies Iind this inIormation useIul so they can generate advertisements
customized speciIically Ior your interests, likes, and dislikes. Adware is generating much
discussion about balancing the responsibilities and rights oI companies and the privacy oI
customers. So, be sure you read and understand all agreements beIore accepting them.
Spyware
Spyware is tracking soItware that hides itselI (runs in the background) and gathers inIormation
without the computer owner's or user's knowledge or permission Ior the beneIit oI someone else.
t uses the computer owner's internet connection without permission to send the collected
inIormation to whomever the tracking soItware designates. This is the reason every home
computer should have an invalid deIault internet connection. Spyware can compromise the saIety
oI your passwords, logon inIormation, Iinancial, or personal inIormation. nIormation collected
can include your online habits and preIerences (where you go, where you shop, Ior what, how
much, how oIten, etc), each key you press on your keyboard, passwords, logon inIormation,
account and Iinancial inIormation, online correspondence and conversations or whatever
inIormation is stated in the agreement.
What spyware and malware have in common is the ability to collect and distribute your personal
inIormation without your permission. Malware can also send and make computer resources and
inIormation available to unknown recipients or remote users without your knowledge or
permission. Both spyware and malware are possible methods Ior identity theIt since the
computer owner or user does not know about or does not provide their permission Ior the
installation and use oI the hidden program or Iile.
Unauthorized soItware installation without the computer user`s or owner`s permission can
include:
O !rograms designed to help steal personal user inIormation to commit identity theIt
without the user or owner oI the computer providing their permission to do so.
O Botnets an unlimited number oI computers inIected with a program designed to
simultaneously attack another computer or network without the knowledge or permission
oI the owner oI each inIected computer.
O isabling security without the computer owner or user providing their permission
O Endless loop pop-up advertisements or adware when the computer user or owner does not
deliberately activate the soItware either through an installed program or through
understanding an End-User License Agreement.
O enial oI Service attacks
O Modem Hijacking the computer user can incur Iinancial telecommunication charges
without their prior permission
O Changing browser settings without the computer owner`s or user`s permission
O Evading uninstalls by deceptive or unIair means
O FalsiIying options Ior uninstallation
O nstalling personal and Iinancial inIormation collection Ieatures without the computer
owner`s or user`s permission
O nstalling keystroke logging soItware on a computer used or owned by someone whom
you are not responsible Ior their saIety and conduct .
:idelines to Avoid Spyware
Follow internet saIety guidelines including:
O Not opening emails or email attachments Irom unknown senders
O Block or don`t click on suspicious pop-up windows
O on`t open Iiles that are more prone to be associated with malware such as .bat, .com,
.exe, .piI, .txt.vbs, .htm.exe or .vbs
O on`t download or execute applications Irom untrusted sources.
O Avoid phishing scams.
O Use updated anti-virus and anti-spyware soItware regularly.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close